Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3713
HistoryAug 25, 2021 - 12:00 a.m.

CVE-2021-3713

2021-08-2500:00:00
ubuntu.com
ubuntu.com
12

7.4 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

13.3%

An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device
emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest
supplied stream number unchecked, which can lead to out-of-bounds access to
the UASDevice->data3 and UASDevice->status3 fields. A malicious guest user
could use this flaw to crash QEMU or potentially achieve code execution
with the privileges of the QEMU process on the host.

Bugs

Notes

Author Note
sbeattie Red Hat claims UAS (usb attached scsi) device emulation is not supported by libvirt
mdeslaur introduced in 1.5.0
OSVersionArchitecturePackageVersionFilename
ubuntu21.10noarchqemu< 1:6.0+dfsg-2expubuntu1.2UNKNOWN
ubuntu22.04noarchqemu< 1:6.2+dfsg-2ubuntu5UNKNOWN

7.4 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

13.3%